A quantum leap in computing

Monday, 30 August 2004, 1:44 PM EST

One of the fundamental problems with computers as they exist today is the two-pronged problem of security. Ensuring that online transactions can be completed in private requires a means of encrypting and decoding our messages. But how do you know that the message hasn't been intercepted, read after code-breaking and re-sent by an eavesdropper?

Computer security depends on factoring numbers. The number 6, for example, can be factored, or expressed, as 2 times 3. Factoring extremely large numbers - up to 24 digits long - lies at the heart of computer security systems and makes e-commerce possible because a modern computer cannot factor large numbers in the time frames necessary for a person to eavesdrop. In fact, it may take the computer millennia to try every possible combination of factors. This is a plus in favor of current methods of encoding with a computer.

By Franklin E. Schroeck, Jr. at the Denver Post.

[ Read more ]




Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //